Download Publication
Who it's for:
Security Architects
Application Developers
System and Security Administrators
Corda Enterprise 4.8 - Security Controls Checklist
Release Date: 12/15/2021
Working Group: Blockchain/Distributed Ledger
- The description of each identified Corda Enterprise 4.8 vulnerability
- The description of each control that can be used to mitigate these vulnerabilities
- How the controls map to NISTv5(SP 800-53 Rev. 5), the standard reference for security controls
Download this Resource
Prefer to access this resource without an account? Download it now.
Acknowledgements
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect
Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.
He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...
Urmila Nagvekar
Urmila Nagvekar is a Certified Information Systems Security Professional (CISSP), with a combined 27 years in Information Technology, Security, and Privacy involving leading Cybersecurity, Information Risk Management, and Data Privacy Programs as business value drivers for Engineering and Geoscience with oil majors.
She has been actively contributing and presenting topics related to Blockchain Security at CSA’s Blockchain/DLT Working ...
Hillary Baron
Senior Technical Director - Research, CSA
Michael Theriault
Jyoti Ponnapalli
Jyoti Ponnapalli is the SVP, Head of Blockchain Innovation Strategy at Truist. She has more than 18 years of experience leading emerging technology and complex digital transformations for fortune 500 companies across a range of industries including Finance, Telecom, Airline, Energy, and Food & Beverage. Prior to joining Truist, she was a Director of Blockchain at DTCC leading strategic initiatives in support of efforts to modernize the fina...
Huili Wang
Teju Oyewole
Frederic de Vaulx
Goni Sarakinov
Gustavo Arreaza
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more